Infrastructure



Beyond the hype: tomorrow’s surveillance, today’s reality
CCTV Handbook 2018, Technews Publishing, Editor's Choice, Surveillance, Information Security, Integrated Solutions, Conferences & Events, Training & Education
iLegal 2017 once again lived up to its reputation and saw a host of presenters offering insights and advice into a range of aspects related to the surveillance world.

Read more...
Putting a face to facial biometrics
CCTV Handbook 2018, Forbatt SA, Surveillance, Integrated Solutions
Put your hands back in your pockets, facial biometrics is the new sweetheart of the surveillance world and certain companies are taking advantage to the potential.

Read more...
To PoE or not to PoE
CCTV Handbook 2018, Editor's Choice
The ability to carry both data and power along the same cable has proven so transformative that in many industries it has become the norm rather than the exception.

Read more...
Cloudy with compliance
1 March 2018, Security Services & Risk Management
Companies increasingly turning to cloud for improved security, efficiency and regulatory compliance.

Read more...
Can you secure security?
March 2018, Graphic Image Technologies, Information Security, Surveillance
Is it possible to protect physical security systems from cyber intruders? Laurence Smith looks at the task of securing physical security.

Read more...
Transforming customer experience in retail
March 2018, Retail (Industry), Integrated Solutions
Behind every great consumer experience is a hard-working retail process, of which technology is playing an increasingly effective role.

Read more...
The Moon at home
February 2018, Editor's Choice, Integrated Solutions, Products & Solutions
World’s first all-in-one smart hub with levitation technology camera to enter into production after a successful crowdfunding campaign.

Read more...
Cyberattacks will not go away
February 2018, Information Security
Cybercrime will continue to grow – the issue for businesses is to determine “do the right people have access to the data they are entitled to access”?

Read more...
Hacking public Wi-Fi
1 February 2018, Editor's Choice, Information Security
Public Wi-Fi is great in so many ways. However, as much as we love the convenience, hackers love public Wi-Fi too, and for different reasons.

Read more...
Intelligent handles, smart PDUs
1 February 2018, Netshield
With the simple addition of intelligent handles, your cabinets are secured and put control back into the businesses’ hands.

Read more...
Smart cities are built on smart thinking
November 2017, Technews Publishing, Editor's Choice, Integrated Solutions
The smart city concept integrates ICT and various physical devices connected to the network to optimise the efficiency of city operations and services and connect to citizens.

Read more...
The complexity of borders
November 2017, Government and Parastatal (Industry), Surveillance, Access Control & Identity Management, Integrated Solutions
Controlling borders is a critical task for governments the world over, both at official and unofficial entry points where illegal crossings are made.

Read more...
The missing mobile puzzle piece
November 2017, Information Security
Companies are neglecting to define what resources can be accessed via mobile and have not identified what devices are already accessing the network.

Read more...
Software defined surveillance
November 2017, Surveillance
Fighting the economic recession by enhancing existing servers and storage used for surveillance operations.

Read more...
People on the move
Access & Identity Management Handbook 2018, Editor's Choice, Access Control & Identity Management, Integrated Solutions
Sanjay Dharwadker looks at some of the changes that have been enacted to better manage Europe’s borders.

Read more...
Home run for integrated security
Access & Identity Management Handbook 2018, Milestone Systems, Integrated Solutions, Surveillance, Access Control & Identity Management
Axis Communications, Extreme, Lenel and Milestone team up to secure 2017 Little League Baseball Series.

Read more...
Facing the future
Access & Identity Management Handbook 2018, neaMetrics, Editor's Choice, Access Control & Identity Management
Facial biometrics is coming into its own today, but is it a 100% reliable means of identity verification and authentication?

Read more...
A mobile holiday
Access & Identity Management Handbook 2018, Access Control & Identity Management
The use of mobile devices, specifically smartphones for access control has taken off over the past year or two, with expectations that its adoption will grow even more.

Read more...
Access a mobile-first world
Access & Identity Management Handbook 2018, Axis Communications SA, Editor's Choice, Access Control & Identity Management
Mobile access control enables mobile devices – such as smartphones and wearables – to function as credentials in providing access to secured buildings, rooms and areas.

Read more...
Portable biometric solutions gain ground
Access & Identity Management Handbook 2018, Access Control & Identity Management, Integrated Solutions
Portable devices offer a cost-effective and reliable alternative for a number of traditional access control applications.

Read more...



<< First   < Previous   Page 28 of 69   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.